Description
The Action URL parameter for one HTML form from this page is dirrectly controlled by user input. The Action parameter specifies the website where the user-submitted information is being sent. An attacker can provide a website controlled by him for the form action parameter and send this malicious link to your users. Any user who will click that link and submit the vulnerable form will send his information to the attacker.
Remediation
Your script should properly sanitize user input.
References
Related Vulnerabilities
Plone CMS Improper Input Validation Vulnerability (CVE-2013-4199)
WordPress Improper Input Validation Vulnerability (CVE-2017-1000600)
WordPress Plugin Slideshow Gallery LITE Arbitrary File Upload (1.4.6)
IBM WebSEAL Improper Input Validation Vulnerability (CVE-2020-4461)
Jenkins Improper Input Validation Vulnerability (CVE-2016-0792)